Security, Privacy, and Applied Cryptography Engineering

Security, Privacy, and Applied Cryptography Engineering

7th International Conference, SPACE 2017, Goa, India, December 13-17, 2017, Proceedings

Ali, Sk Subidh; Eisenbarth, Thomas; Danger, Jean-Luc

Springer International Publishing AG

11/2017

295

Mole

Inglês

9783319715001

15 a 20 dias

4861

Descrição não disponível.
On the (in)Security of ChaCha20 Against Physical Attacks.- An Industrial Outlook on Challenges of Hardware Security in Digital Economy.- How to Digitally Construct and Validate TRNG and PUF Primitives Which Are Based on Physical Phenomenon.- Cache Attacks: From Cloud to Mobile.- May the Fourth Be with You: A Microarchitectural Side Channel Attack on Several Real-World Applications of Curve25519.- The Crisis of Standardizing DRM: The Case of W3C Encrypted Media Extensions.- Parameter Choices for LWE.- Efficient Side Channel Testing of Cryptographic Devices Using TVLA.- IoT Insecurity - Innovation and Incentives in Industry.- Hardware enabled cryptography: Physically Unclonable Functions and Random Numbers as Roots of Trust.- Tackling the Time-Defence: An Instruction Count Based Microarchitectural Side-channel Attack on Block Ciphers.- Hey Doc, Is This Normal?: Exploring Android Permissions in the Post Marshmallow Era.- Efficient Software Implementation of Laddering Algorithms over Binary Elliptic Curves.- Analysis of Diagonal Constants in Salsa.- Practical Fault Attacks on Minalpher: How to Recover Key with Minimum Faults.- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices.- Similarity Based Interactive Private Information Retrieval.- A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA).- Variable-Length Bit Mapping and Error Correcting Codes for Higher-Order Alphabet PUFs.- Mutual Friend Attack Prevention in Social Network Data Publishing.- Short Integrated PKE+PEKS in Standard Model.- Differential Fault Attack on Grain v1, ACORN v3 and Lizard.- Certain observations on ACORN v3 and the Implications to TMDTO Attacks.- Efficient Implementation of Private License Plate Matching Protocols.
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
authentication;cryptanalysis;cryptography;data privacy;encryption;network security;privacy;public key cryptography;security;side channel attack;software engineering